The usability of knowledge based authentication methods on mobile devices

0044 English OPEN
Rooney, James;
(2013)
  • Subject: QA75

Mobile devices are providing ever increasing functionality to users, and the risks associated with applications storing personal details are high. Graphical authentication methods have been shown to provide better security in terms of password space than traditional app... View more
  • References (9)

    Brown, A.S., Bracken, E., Zoccoli, S. & Douglas, K. (2004). Generating and remembering passwords. Applied Cognitive Psychology. 18 (6): 641-651.

    Buchanan, G., Farrant, S., Jones, M., Thimbleby, H., Marsden, G. & Pazzani, M. (2001).

    Improving Mobile Internet Usability. In: Proceedings of the 10th International Conference on the World Wide Web. WWW '01. Hong Kong, New York, NY, USA: ACM. pp. 673- 680.

    Budgen, D. (2008). ASE-EVAL: Software Evaluation Glossary - Version 1.1. Available from: http://www.dur.ac.uk/ebse/resources/ASE-EVAL-glossary.pdf. [Accessed: 07/07/2010].

    Buennemeyer, T.K., Nelson, T.M., Clagett, L.M., Dunning, J.P., Marchany, R.C. & Tront, J.G. (2008). Mobile Device Profiling and Intrusion Detection Using Smart Batteries. In: 41st Annual Hawaii International Conference on System Sciences. Waikoloa, Big Island, Hawaii, January 7-10, IEEE Computer Society. pp. 296-296.

    Burr, W.E., Dodson, D.F. & Polk, W.T. (2006). Electronic Authentication Guideline.

    Available from: http://csrc.nist.gov/publications/nistpubs/800-63/SP800-63V1_0_2.pdf.

    [Accessed: 08/01/2010].

    Hager, C.T. & Midkiff, S.F. (2003). An analysis of Bluetooth security vulnerabilities. In: IEEE Wireless Communications and Networking. New Orleans, LA, USA, 20th March 2003, pp. 1825-1831.

  • Metrics
Share - Bookmark